首页> 外文期刊>ACM Transaction on Information and System Security >MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)
【24h】

MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models (Extended Version)

机译:MaMaDroid:通过构建行为模型的马尔可夫链来检测Android恶意软件(扩展版)

获取原文
获取原文并翻译 | 示例
           

摘要

As Android has become increasingly popular, so has malware targeting it, thus motivating the research community to propose different detection techniques. However, the constant evolution of the Android ecosystem, and of malware itself, makes it hard to design robust tools that can operate for long periods of time without the need for modifications or costly re-training. Aiming to address this issue, we set to detect malware from a behavioral point of view, modeled as the sequence of abstracted API calls. We introduce MAMADROID, a static-analysis-based system that abstracts app's API calls to their class, package, or family, and builds a model from their sequences obtained from the call graph of an app as Markov chains. This ensures that the model is more resilient to API changes and the features set is of manageable size. We evaluate MAMADROID using a dataset of 8.5K benign and 35.5K malicious apps collected over a period of 6 years, showing that it effectively detects malware (with up to 0.99 F-measure) and keeps its detection capabilities for long periods of time (up to 0.87 F-measure 2 years after training). We also show that MAMADROID remarkably overperforms DROIDAPIMINER, a state-of-the-art detection system that relies on the frequency of (raw) API calls. Aiming to assess whether MAMADROID'S effectiveness mainly stems from the API abstraction or from the sequencing modeling, we also evaluate a variant of it that uses frequency (instead of sequences), of abstracted API calls. We find that it is not as accurate, failing to capture maliciousness when trained on malware samples that include API calls that are equally or more frequently used by benign apps.
机译:随着Android变得越来越流行,针对它的恶意软件也越来越流行,从而促使研究界提出不同的检测技术。但是,Android生态系统以及恶意软件本身的不断发展,使得很难设计出可以长时间运行而无需修改或进行昂贵的重新培训的强大工具。为了解决这个问题,我们从行为的角度出发,以抽象API调用序列为模型,检测恶意软件。我们介绍了MAMADROID,这是一个基于静态分析的系统,可以将应用程序的API调用抽象到其类,程序包或族,并根据从应用程序的调用图获得的序列作为马尔科夫链来构建模型。这样可以确保模型对API的更改更具弹性,并且功能集的大小可管理。我们使用在6年内收集到的8.5K良性和35.5K恶意应用程序的数据集评估MAMADROID,表明它可以有效地检测恶意软件(高达0.99 F量度),并长期保持其检测能力(高达训练后2年达到0.87 F值)。我们还显示,MAMADROID的性能明显优于DROIDAPIMINER,DROIDAPIMINER是依赖于(原始)API调用频率的最新检测系统。为了评估MAMADROID的有效性主要来自API抽象还是来自序列建模,我们还评估了其变体,它使用了抽象API调用的频率(而不是序列)。我们发现它并不那么准确,在经过恶意软件样本训练后未能捕获恶意软件,其中包括良性应用程序均等或更频繁地使用的API调用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号